Washington, DC CISO Virtual Executive Summit

December 1, 2020 | 8:00am - 1:15pm EST

December 1, 2020 | 8:00am - 1:15pm EST

REGISTER NOW

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Washington, DC CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Leading through disruption

The future of the CIO and CISO

Embracing accelerated change

Co-Chairs

Sam Abbate

Northrop Grumman
Vice President and Chief Information Officer

Jim Connelly

Lockheed Martin
Vice President & Chief Information Officer

Mike Gordon

Lockheed Martin
VP & CISO

André Mendes

Department of Commerce
CIO

Shamim Mohammad

CarMax Inc
SVP & CIO

Christopher Porter

Fannie Mae
CISO

Agenda


December 1, 2020

8:00am - 8:45am EST Virtual Summit Keynote

Tomorrow’s Cyberthreats – Staying One Step Ahead

Israel Barak headshot

Israel Barak

CISO

Cybereason

Sanjeev Addala headshot

Sanjeev Addala

Chief Information Digital Officer

AES Corporation

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join this virtual keynote to explore:

  • Strategies for addressing the emerging threat landscape
  • The role today’s CIOs and CISOs play in guiding business strategy to mitigate risk
  • Communication strategies for educating users about security – and holding them accountable

8:45am - 9:00am EST Break

9:00am - 10:00am EST Virtual Summit Boardroom

Cloud IAM - Enlightenment or Inferno?

Brian Johnson headshot

Brian Johnson

SVP, Cloud Security Practice

DivvyCloud

Joseph Dyer headshot

Joseph Dyer

CISO

ICF

Vikas Mahajan headshot

Vikas Mahajan

VP & CISO

American Red Cross

Strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex 
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

9:00am - 10:00am EST Virtual Summit Boardroom

Is Your Technology Getting the Most Out of Your Strategy?

Bryan Kirschner headshot

Bryan Kirschner

Vice President, Strategy

DataStax

Michael Cannon headshot

Michael Cannon

CTO

Stafford County Virginia

Rajiv Sondhi headshot

Rajiv Sondhi

Group CTO

Arcadis

Technology itself is not a strategy, but maximizing the right technology makes a strong strategy successful. Getting there requires excellent data for decision-making, actionable metrics for benchmarking and AI-enrichment of quality information to take the next step. In this session, CIOs will dive into the ways that data-driven enterprises leverage tech better to come out on top. 

Join this boardroom to discuss:

  • Data scalability, data portability and AI-ready infrastructure
  • The right tools to enhance to enhance your digital-consumer strategy
  • Benchmarking tools and processes

9:00am - 10:00am EST Virtual Summit Boardroom

Measuring and Communicating Risk - What Really Counts?

John Burger headshot

John Burger

CISO and Vice President of Infrastructure

ReliaQuest

Scott Daitzman headshot

Scott Daitzman

Chief Information Security Officer

NVR

Jeremy Dold headshot

Jeremy Dold

Business Information Security Officer

Liberty Mutual

Richard Friedberg headshot

Richard Friedberg

Chief Security Officer

Blackbaud

Leading information security executives know that the language of technology doesn’t always resonate outside of IT. “Risk” is the vocabulary of the business, yet measuring and discussing this all-important concept in an actionable way remains a unique challenge.

Join this session to learn:

  • Actionable risk metrics, both for use inside the security function and with outside stakeholders
  • How the language and awareness of information security risk has evolved
  • Techniques to automate collection of meaningful security metrics

10:00am - 10:45am EST Virtual Summit Keynote

Protecting People, the New Perimeter

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

Mike Gordon headshot

Mike Gordon

VP & CISO

Lockheed Martin

Randy Vickers headshot

Randy Vickers

CISO

United States House of Representatives

As 2020 changes the way we live and work, cyber criminals are adapting as well. Join us as we examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to stop attackers and protect their organization.

Join this keynote for a discussion on:

  • Why social engineering dominates among today’s cyber threat actors
  • How remote work and the move to the cloud has changed the nature of threats
  • The ways their organizations are building controls to better understand and protect people

10:45am - 11:00am EST Break

11:00am - 12:00pm EST Virtual Summit Boardroom

Building Data & Analytics Capabilities for Better Business Decisions

Cameron Deatsch headshot

Cameron Deatsch

Chief Revenue Officer

Atlassian

Scott Midkiff headshot

Scott Midkiff

VP, IT & CIO

Virginia Tech

Howard Spira headshot

Howard Spira

Senior Vice President and CIO

Export-Import Bank of the United States

Today’s enterprise has access to endless amounts of data and CIOs must continually find true meaning and value in the data. This peer-to-peer discussion will consider ways to mature your data and analytics program to provide accurate, real-time data.

Come ready to discuss how to:

  • Implement data strategies that align with desired business outcomes
  • Leverage data to gain greater insights and drive value
  • Define clear data ownership and standardization

11:00am - 12:00pm EST Virtual Summit Boardroom

Achieving an Effective Cloud Strategy

Chris Radich headshot

Chris Radich

VP, Digital Strategy

Salesforce

Jamie Holcombe headshot

Jamie Holcombe

Chief Information Officer

United States Patent & Trademark Office

David Shive headshot

David Shive

CIO

General Services Administration

As organizations evolve to keep pace with a digital world, successful cloud strategies elude many IT departments. Dealing with high operational costs and a talent shortage are just some of many reasons that cloud solutions are often a bigger undertaking than they first appear.


This session will focus on:

  • Discovering the right road map for your organization
  • Winning trust during transition
  • Avoiding common pitfalls

11:00am - 12:00pm EST Virtual Summit Boardroom

Security Operations – Empowering Teams with Automation

Ken Deitz headshot

Ken Deitz

CISO

SecureWorks

Anil Katarki headshot

Anil Katarki

CISO & Director Cyber Security Services

Perspecta

Tunde Oni-Daniel headshot

Tunde Oni-Daniel

Vice President, SMD & Head of Security Architecture, Engineering & Operations

OneMain Financial

Jesse Whaley headshot

Jesse Whaley

AVP, CISO

Amtrak

Automation in the world of information security allows teams to move more swiftly in the face of persistent threats while stitching together best-in-class tools that get the job done. This allows smaller teams to do more, but rather than eliminating the need for security talent, such technologies are freeing up bandwidth for analysts and others to engage in the meaningful work that requires a human touch.

Join this session to learn:

  • How automation and orchestration are playing a role in today’s security stack
  • Areas where your peers refuse to automate, and why
  • The future of security automation, including under malicious actors

12:00pm - 12:45pm EST Virtual Summit Keynote

Leading Through Disruption

Beth Dunphy headshot

Beth Dunphy

Director, BISO & Privacy Leader

IBM Corporation

Mark Booth headshot

Mark Booth

CIO

Perdue Farms

Nicolas Leshock headshot

Nicolas Leshock

CIO

General Dynamics

The timeline for adopting strategic technology and security trends rapidly increased in recent months, and now CIOs and CISOs are on the forefront of leading innovative business opportunities.

Join this session for a discussion on:

  • Dynamic leadership in a volatile world
  • Remastering your brand in times of transition
  • Practical examples of adaptive strategy in action


By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

12:45pm - 1:15pm EST Networking

Community Networking

Jamie Holcombe headshot

Jamie Holcombe

Chief Information Officer

United States Patent & Trademark Office

Join the community networking session for an opportunity to informally connect with your peers. Through the free-form Shindig virtual platform, attendees can connect organically in one-on-one discussions or small groups. 

REGISTER

Your Community Partners


CISO Thought Leader
Key Partners
Program Partners

Washington, DC CISO Program Manager


For inquiries related to this event, please reach out to your dedicated program manager.

Jordan Guess

971-717-6668

jordan.guess@evanta.com